• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/103

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

103 Cards in this Set

  • Front
  • Back
SDLC
Planning, Analysis, Design, Development, Testing, Implementation, Maintenance
Planning
select system project, assess feasibility, produce project plan (select team members, develop schedule, select methodology)
Analysis
collect/analyze data (study the current system), determine business requirements
Design
describe desired features and operations of the system
Development
transforming designs into the actual system
Maintenance
performing changes, corrections, additions, and upgrades to ensure the system continues to meet business goals, most expensive part
Waterfall methodology
each phase is performed sequentially from planning through implementation and maintenance; inflexible, expensive and requires rigid adherence to the sequentially based steps
Agile methodologies
quick and flexible, small projects delivered quickly and frequently, daily collaboration with users
Primary principles an organization should follow for successful agile software development
slash the budget, if it doesn't work, kill it, keep requirements to a minimum, test and deliver frequently, assign non-IT executives to software projects
Rapid Application Development
Emphasizes user involvement by constructing working prototypes of a system to accelerate the systems development project
Extreme programming
Breaks a project into tiny phases, developers cannot continue on to the next phase until the first is complete
Feasibility Assessment
Technical, economical, legal, operational, scheduling
Conversion
Direct, parallel, pilot, phased
Sequential Flowcharting
one step is completed followed by a next step and so on
Selection Flowcharting
the answer to a question causes a branch in the process; ex. if-then-else, if-then-null-else, nested-if-then-else
Repetition Flowcharting
allows one or more actions to be repeated until a condition is met, loop/iteration
Compiler
translates whole program, translate once and then it can run over and over again, fast because it doesn't have to keep translating, must install machine-level on user's machine before program runs
Interpreter
converts code to machine language statement-by-statement just before execution, translation done every time so it makes it slower
Two level approach
uses both a compiler and an interpreter, translates whole program, then statement by statement
Syntax error
incorrect use of language's defined set of key terms and operators, usually caught by compiler or interpreter
Run-time (logic) error
does not violate specific syntax but logically incorrect, found when running
3 types of error detection
visual code examination, debugger step-through, test cases
JVM (Java Virtual Machines)
last-step interpreter that is specific to each machine type in each computer's browser
Java Applet
uses 2-level approach, uses JVM in browser, compiled into bytecode, stored as a separate file
Java Script
interpreted at run time, entire script embedded in HTML document
High-level language
uses defined grammar and specific command words, makes it easier to write code
Low-level language
generally written to interface with a specific type of hardware, such as a specific computer processor, tedious to write because instructions are very detailed and specific
business wikis
collaborative web pages that allow users to edit documents, share ideas, or monitor the status of a project
collaboration system
an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information
content management system
provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment
core competency
an organization's key strength or business function that it does better than any of its competitors
digital asset management system
though similar to document management, DAM generally works with binary rather than text files, such as multimedia file types
Digital Darwinism
organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction
digital divide
when those with access to technology have great advantages over those without access to technology
disruptive technology
a new way of doing things that initially does not meet the needs of existing customers
document management system
supports the electronic capturing, storage, distribution, archival, and accessing of documents
explicit knowledge
consists of anything that can be documented, archived, and codified, often with the help of IT
Groupware
software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing
hypertext transport protocol
the internet standard that supports the exchange of information on the WWW
knowledge management
involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions
protocol
a standard that specifies the format of data as well as the rules to be followed during transmission
semantic Web
an evolving extension of the WWW in which web content can be expressed not only in natural language, but also in a format that can be read and used by software agents, thus permitting them to find, share, and integrate information more easily
service-oriented architecture
a collection of services that communicate with each other, for example, passing data from one service to another or coordinating an activity between one or more services
sustaining technology
produces an improved product customers are eager to buy, such as a faster car or larger hard drive
tacit knowledge
the knowledge contained in people's heads
videoconference
a set of interactive telecommunication technologies that allow two or more locations to interact via two-way video and audio transmissions simultaneously
Web 2.0
a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet - a more mature, distinctive medium characterized by user participation, openness, and network effects
web content management systems
adds an additional layer to document and digital asset management that enables publishing content both to intranets and to public websites
wikis
web-based tools that make it easy for users to add, remove, and change online content
workflow management systems
facilitates the automation and management of business processes and controls the movement of work through the business process
World Wide Web
a global hypertext system that uses the internet as its transport mechanism
application service provider
a company that offers an organization access over the Internet to systems and related services that would otherwise have to be located in personal or organizational computers
brick-and-mortar business
business that operates in a physical store without an internet presence
business-to-business (B2B)
applies to businesses buying from and selling to each other over the internet
business-to-consumer (B2C)
applies to any business that sells its products or services to consumers over the internet
clickstream data
exact patterm of a consumer's navigation through a site
click-through
a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser
Consumer-to-business
applies to any consumer that sells to a business over the internet
consumer-to-consumer
applies to sites primarily offering goods and services to assist customers interacting with each other over the internet
content provider
companies that use the internet to distribute copyrighted content
E-business
the conducting of business on the internet, not only buying and selling, but also serving customers and collaborating with business partners
ecommerce
the buying and selling of goods and services over the internet
e-procurement
the B2B purchase and sale of supplies and services over the internet
e-shop
a version of a retail store where customers can shop at any hour of the day without leaving their home or office
extranet
an intranet that is available to strategic allies (such as customers, suppliers and partners)
interactivity
measures the visitor interactions with the target ad
intermediaries
agent, software, or business that brings buyers and sellers together to provide a trading infrastructure to enhance ebusiness
internet service provider
a company that provides individuals and other companies access to the internet along with additional related services, such as website building
intranet
an internalized portion of the internet, protected from outside access, that allows an organization to provide access to information and application software to only its employees
kiosk
publicly accessible computer system that has been set up to allow interactive information browsing
mobile commerce (m-commerce)
the ability to purchase goods and services through a wireless Internet-enabled device
Online brokers
intermediaries between buyers and sellers of goods and sellers
online service provider
offers an extensive array of unique services such as its own version of a web browser
portal
a website that offers a broad array of resources and services, such as email, online discussion groups, search engines, and online shopping malls
pure-play (virtual) business
a business that operates on the internet only without a physical store
service level agreements
defines the specific responsibilities of the service provider and sets the customer expectations
web mashup
a website or web application that uses content from more than one source to create a completely new service
wireless internet service provider (WISP)
an ISP that allows subscribers to connect to a server at designated hotspots or access points using a wireless connection
authentication
a method for confirming users' identities
authorization
the process of giving someone permission to do or have something
Biometrics
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
content filtering
occurs when organizations use software that filters content to prevent the transmission of unauthorized information
denial-of-service attack
floods a website with so many requests for service that it slows down or crashes the site
encryption
scrambles information into an alternative form that requires a key or password to decrypt the information
firewall
hardware/software that guards a private network by analyzing the information leaving and entering the network
hacker
people very knowledgeable about computers who use their knowledge to invade other people's computers
hoaxes
attack computer systems by transmitting a virus hoax, with a real virus attached
information security
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
insider
legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
intrusion detection software
searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm
malicious code
includes a variety of threats such as viruses, worms, and Trojan horses
packet tampering
altering the contents of packets as they travel over the internet or altering data on computer disks after penetrating a network
phishing
technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email
smart card
a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
sniffer
a program or device that can monitor data traveling over a network
social engineering
using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
spoofing
the forging of the return address on an email so that the email message appears to come from someone other than the actual sender
spyware
software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about
token
small electronic devices that change user passwords automatically
trojan-horse virus
hides inside other software, usually as an attachment or a downloadable file
virus
software written with malicious intent to cause annoyance or damage
worm
a type of virus that spreads itself, not only from file to file, but also from computer to computer
bytecode
mostly translated computer code made available to users for download